Criterion 1 A - 4 - Mastery Pros and Cons: Thoroughly compares the pros and cons of using the tracking devices in the shipping business as a function of competitive advantage. ; Several relevant examples and original observations are integrated throughout this section, and terminology is used correctly.Criterion 2 A - 4 - Mastery Knowledge and Change: Examines deeply and broadly how knowledge of each truck’s location and delivery times will change the shipping business. Logical conclusions are drawn from the examination.Criterion 3 A - 4 - Mastery Ability to Compete: Comprehensively explains how this tracking/GPS system will affect this business’s ability to compete with similar companies. ; Relevant thorough definitions and examples are provided.Criterion 4 A - 4 - Mastery Drivers’ Reactions: Thoroughly describes how truck drivers might react to having tracking/GPS devices on the organization’s trucks. Business significance of possible reactions is explained clearly and logically. ; Professional language is used, and section is free of grammar errors.Criterion 5 A - 4 - Mastery Privacy/Security: Thoroughly defines specific and germane privacy/security concerns in using tracking/GPS devices on the trucks. Section contains support from credible sources.Criterion 6 A - 4 - Mastery Formatting: Begins with an introduction that completely prepares the readers for the rest of the report. ; Thoroughly addresses all points above in a correctly and professionally formatted body section. ; Ends with a brief yet complete conclusion that reminds busy readers of the document’s purpose and main supports. ; Has a References page that cites all sources in APA. Skip to content O'Reilly search menu Chapter 26: Secure Application Design 12h 44m remaining CHAPTER 26 Secure Application Design This chapter covers the important security considerations that should be part of the development cycle of web applications, client applications, and remote administration, illustrating potential security issues and how to solve them. After an application is written, it is deployed into an environment of some sort, where it remains for an extended period of time with only its original features to defend it from whatever threats, mistakes, or misuse it encounters. A malicious agent in the environment, on the other hand, has that same extended period of time to observe the application and tailor its attack techniques until something works. At this point, any number of undesirable things could happen. For example, there could be a breach, there could be a vulnerability disclosure, malware exploiting the vulnerability could be released, or the exploit technique could be sold to the highest bidder. Most of these undesirable things eventually lead to customers who are unhappy with their software vendors, regardless of whether or not the customers were willing to pay for security before the incident occurred. For that reason, security is becoming more important to organizations ...